Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Newsletter Articles
|
![]() |
Encryption: secure encrypted backups by careful key management; Second article in a series on encrypting backed up data stored to tape or other mobile mediaStarr, MattComputer Technology Review, 2006, Vol.27 (1), p.30West World Productions, IncTexto completo disponível |
2 |
Material Type: Newsletter Articles
|
![]() |
ENCRYPTION ISSUES: MOVING TOWARD HIGHER PERFORMANCE NETWORK SECURITY SUBSYSTEMSMuegge, MarkComputer Technology Review, 1999, Vol.19 (10), p.12-12West World Productions, IncTexto completo disponível |
3 |
Material Type: Newsletter Articles
|
![]() |
Encryption: we know we need it--so now what? Encrypting backed up data stored to tape or other mobile media.(Advantages and disadvantages of data encryption)Starr, MattComputer Technology Review, 2006, Vol.27 (1), p.1West World Productions, IncTexto completo disponível |
4 |
Material Type: Newsletter Articles
|
![]() |
Federal government finally adopts tighter encryption standardPiven, JoshuaComputer Technology Review, 2002, Vol.22 (1), p.8Los Angeles: West World Productions, IncTexto completo disponível |
5 |
Material Type: Newsletter Articles
|
![]() |
Data encryption strategies; Part 2: encrypting high-performance, high-volume storageMoore, FredComputer Technology Review, 2005, Vol.25 (6), p.1West World Productions, IncTexto completo disponível |
6 |
Material Type: Newsletter Articles
|
![]() |
Preparing for encryption: new threats, legal requirements boost need for encrypted dataMoore, FredComputer Technology Review, 2005, Vol.25 (5), p.1West World Productions, IncTexto completo disponível |
7 |
Material Type: Newsletter Articles
|
![]() |
Risks associated with transporting storage media & how to deal with themThompson, Nathan CComputer Technology Review, 2005, Vol.25 (5), p.25Los Angeles: West World Productions, IncTexto completo disponível |
8 |
Material Type: Newsletter Articles
|
![]() |
Data protection and disaster recovery of local and remote file serversGoodman, Julie HerdComputer Technology Review, 2005, Vol.25 (5), p.29Los Angeles: West World Productions, IncTexto completo disponível |
9 |
Material Type: Newsletter Articles
|
![]() |
Vulnerability management technology: a powerful alternative to attack management for networksKeanini, TimComputer Technology Review, 2003, Vol.23 (5), p.18West World Productions, IncTexto completo disponível |
10 |
Material Type: Newsletter Articles
|
![]() |
Improving data security by protecting tape-based storageComputer Technology Review, 2005, Vol.25 (3), p.29Los Angeles: West World Productions, IncTexto completo disponível |